In the digital age, speed has never been more critical. Customers expect an instant response to a query. Executives expect sales data on their tablets in front of them in real-time. A site manager at an oil refinery needs an instant alert about a defective valve. An IT manager expects to know about a phishing email before it hits his employees’ inboxes.

The 'need for speed' is impacting the physical security sector too. Customers increasingly expect their security systems to identify and act upon threats before they turn into real incidents. They expect to know right now if the fire or intruder alarm is false, and to take corrective action swiftly.

Driven by this heightened customer demand for quicker information to make better decisions faster, innovation in video surveillance technology has accelerated in recent years.

Video Analytics For Fast Threat Detection

Video analytics enables site managers and security teams to swiftly address threats in any building or around a perimeter, often before they take place. For example, Honeywell’s Xtralis LoiterTrace is a technology that can identify an individual hovering suspiciously in an area, alert the security team or central monitoring station (CMS) and is even capable of delivering a pre-emptive voice warning to the potential criminal.

So sophisticated are the latest technologies available on the market that, when correctly installed, they are capable of differentiating between a sheep grazing near an airport fence and a would-be intruder crawling on their hands and knees. They are also designed to withstand outside forces that negatively impact system performance such as adverse weather conditions or animal interference.

Some developments from Honeywell also enable geo-fencing of specific sections of a video frame so the system can be set up so that an alarm is only triggered if a specific section of the picture is occupied by an individual. In busy areas such as a parking garage or a shopping center, these innovations help to target specific areas that require surveillance and minimize false alarms.

Developments from Honeywell enable geo-fencing of specific sections of a video frame
Technology can identify an individual hovering suspiciously and alert the security team or central monitoring station

Video Verification Technology Reduces False Alarms

False alarms cost organizations money, and cause hassle and reputational damage if they are not quickly and decisively addressed by a business. For that reason, the integration of video verification technology that can visually confirm the presence of a threat, is one of the most exciting developments in the physical security sector today.

Let's imagine that a CMS supporting a major industrial site detects an alarm going off in one of the maintenance buildings. The default decision today is often a call to the site manager followed by an inconvenient, time-consuming site visit or a call to the local police force with a request to investigate (which may be ignored). Video verification enables the existence and nature of an intrusion to be immediately detected and addressed.  

Using Honeywell’s Videofied, a visual verification technology, an Arizona-based security contractor Eyesite Security recently apprehended a copper theft ring of three men and a woman who had been repeatedly targeting a construction site and stealing metal in the back of a van. The company used mounted wireless, cordless, weatherproof MotionViewers throughout a jobsite to act as portable sentries which enabled a quick, effective response.

Detecting Fire And Toxic Emissions

Another area that video verification is accelerating decision-making is in the crucial early detection of fire and other toxic emissions. Honeywell’s VESDA air sampling technology is up to 15 times more sensitive than a standard ceiling-mounted smoke detector. The addition of video verification to this product is compelling for installers and end users.

Triggered by the smoke alarm, new technologies such as the ADPRO SmokeTrace can analyze images from strategically placed cameras to confirm the presence of smoke using video technology. These images are then transmitted to a CMS for assessment and appropriate action as well as actionable intelligence for first responders that speeds up and improves their decision making.

New technologies can analyse images from strategically placed cameras to confirm the presence of smoke using video technology
Video verification is accelerating decision-making in the crucial early detection of fire and other toxic emissions

Integrating Security And Building Management

The seamless integration of various security, safety and building management technologies into one unified system is another way organizations can significantly accelerate the speed of both human and machine-to-machine decision making.

A simple example is video management systems - like Honeywell’s MAXPRO® VMS, which enable a user to control multiple sources of video subsystems in a facility to collect, manage and present video in a clear and concise manner. This provides security teams at large sites with the ability to view multiple video inputs concurrently, weighing up risk in real-time and reacting quickly to threats.

A sophisticated example is the Honeywell deployment of the Pro-Watch® integrated security management suite at Nantes University Hospital in France, which includes video surveillance, access control, and intruder detection systems to improve the security of staff members, visitors and patients.

A single monitoring center allows alarms and video footage to be monitored by security staff, while another set of cameras are deployed to control the access of emergency and service vehicles to the hospital. The management tool also allows the hospital’s 12,000 professionals, and 5,000 guest visitors, to access the hospital’s buildings, car parks and restaurants using a unique access card.

Benefits Of Superior User Interface

Much has been made about the ‘Apple effect’ on all industries, driving up the quality of the user interface and simplicity of the experience. However, the major benefit of a superior UI is not aesthetic, it’s functional. Simple, clearly laid out user interfaces can significantly speed up the amount of time taken to install, learn, operate and maintain a system, as well as reducing manual errors. Honeywell seeks to create its systems with a ‘"Learn One, Know Them All" philosophy for this reason.

In summary, the digital world has significantly increased the speed of doing business. It has raised customer, employee and stakeholder expectations to new heights. Video surveillance technology – analytics, verification, integration, UI - is quickly evolving to match, but companies must adopt it aggressively to keep pace with the breathless new business environment.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

Author profile

Mick Goodfellow General Manager, Commercial Security EMEA, Honeywell

In case you missed it

What Are The New Trends And Opportunities For Biometrics?
What Are The New Trends And Opportunities For Biometrics?

A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opportunities with biometrics (facial, fingerprint, iris and/or voice)?

Rule Triggering ‘Blacklist’ Provision of NDAA Ready to Take Effect
Rule Triggering ‘Blacklist’ Provision of NDAA Ready to Take Effect

Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules  Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions  The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns.   Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.

Why Biometrics is Key for the New Era of Convenient Workplace Security
Why Biometrics is Key for the New Era of Convenient Workplace Security

The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fueled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy. With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working.   The end of the humble password? A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords. Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches. Between phishing, hacking and simple guesswork, passwords are easily compromised Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year. In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way.   Smarter workplace authentication with biometrics Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof. In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work. Privacy and biometrics - explained Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords. When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win. Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure. Reimagining workplace security As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace. Adding biometric authentication to end-point devices can considerably reduce data breaches Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine. The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear. So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.